bring your own device
The Fourth Step to Enterprise Mobility: Create an App Checkpoint
2 min read
This is the fourth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post...
Register to Learn About Cisco’s Policy Enforcement Solution
1 min read
In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release. During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest […]
Cisco’s Policy Enforcement Solution Delivers
1 min read
Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations. Cisco’s leading One Policy Solution—the Identity Services Engine (ISE)—now delivers even […]
Third Step to Enterprise Mobility: The Division of Devices
2 min read
This is the third post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. Be sure to read...
Summary: [Cisco Cartoon Catalyst Series] Prime Your Network for the Rise of the Devices
1 min read
Teachers, students, and staff with their varied wired or wireless gadgets and corresponding application access makes up a daunting sea of devices for any IT professional, whose responsibility is to provide optimized network performance. In his latest blog, Prime Your Network for the Rise of the Devices, Cisco’s Rahul Chohan discusses how Cisco Prime Infrastructure, a part […]
[Cisco Cartoon Catalyst Series] Prime Your Network for the Rise of the Devices
2 min read
It’s a nightmare out there. School districts’ wireless networks now have to support teachers, students, and staff – all touting desktops, tablets, smartphones, and/or laptops. For some in IT, knowing who is accessing what using what on the network (a confusing statement itself) could very well be cosmic chaos; for others, it is simply a […]
Higher Education Races Towards 802.11ac
1 min read
[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER It’s no secret that mobile devices are playing a larger part in today's...
[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Pe …
1 min read
Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student...
Three Simple Ways to Boost Mobile Device Security
2 min read
The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security. Recently, I came across a Wharton...